CN114422216A - Internet of things equipment binding method and device and storage medium - Google Patents

Internet of things equipment binding method and device and storage medium Download PDF

Info

Publication number
CN114422216A
CN114422216A CN202111675334.5A CN202111675334A CN114422216A CN 114422216 A CN114422216 A CN 114422216A CN 202111675334 A CN202111675334 A CN 202111675334A CN 114422216 A CN114422216 A CN 114422216A
Authority
CN
China
Prior art keywords
internet
bound
things
equipment
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111675334.5A
Other languages
Chinese (zh)
Other versions
CN114422216B (en
Inventor
赵伟
朱龙
李冬琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Huacheng Software Technology Co Ltd
Original Assignee
Hangzhou Huacheng Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Huacheng Software Technology Co Ltd filed Critical Hangzhou Huacheng Software Technology Co Ltd
Priority to CN202111675334.5A priority Critical patent/CN114422216B/en
Publication of CN114422216A publication Critical patent/CN114422216A/en
Application granted granted Critical
Publication of CN114422216B publication Critical patent/CN114422216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application relates to a method, a device and a storage medium for binding Internet of things equipment, wherein the method comprises the steps of obtaining the to-be-bound Internet of things equipment needing to be bound to a user account, and generating an equipment binding request; sending the device binding request to the cloud platform; after receiving the equipment binding request, the cloud platform sends the encrypted information to the bound Internet of things equipment bound under the user account; receiving a first ciphertext sent by a cloud platform; when the device binding request does not include a public key of the user terminal, sending a first ciphertext to the Internet of things device to be bound; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to the decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses the network access point provided by the bound Internet of things equipment according to the service identifier set and the password. By the method and the device, the problem of unsafe information is solved, and network access and device binding of the batch Internet of things devices are realized.

Description

Internet of things equipment binding method and device and storage medium
Technical Field
The application relates to the technical field of internet of things, in particular to a method and a device for binding internet of things equipment and a storage medium.
Background
The Internet of Things (IoT) is to collect information of objects to be monitored, connected and interacted through various devices and technologies such as various information sensors and controllers, and to implement intelligent management of the objects through accessing a network. Therefore, how to enable the device to be conveniently and safely accessed to the network to complete device binding can be a key technology in the field of internet of things.
In the device binding scheme of the internet of things in the prior art, the device binding information of the device to be bound is not encrypted, so that the problem of unsafe information caused by interception and decryption of the information exists.
Aiming at the problem of unsafe information in the related technology, no effective solution is provided at present.
Disclosure of Invention
The embodiment provides an internet of things device binding method, an internet of things device binding device and a storage medium, and aims to solve the problem that information is unsafe in the related art.
In a first aspect, in this embodiment, a method for binding devices of the internet of things is provided, the method including,
acquiring the to-be-bound Internet of things equipment needing to be bound to a user account, and generating an equipment binding request;
sending the device binding request to a cloud platform; after receiving the equipment binding request, the cloud platform sends encrypted information to the bound Internet of things equipment bound under the user account, wherein the encrypted information is generated by the cloud platform according to the equipment binding request;
receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things equipment by the bound internet of things equipment according to the encryption information and is sent to a cloud platform;
when the equipment binding request does not include a public key of a user terminal, sending the first ciphertext to the to-be-bound Internet of things equipment; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
In some embodiments, when the device binding request does not include the public key of the user terminal, the encrypted information and the decrypted information are both device salt values; and the equipment salt value is generated according to the equipment identifier and the equipment security code of the equipment of the Internet of things to be bound.
In some embodiments, after accessing a network access point provided by the bound internet of things device according to the service identifier set and the password, the method includes,
receiving first equipment binding confirmation information sent by the cloud platform, and determining that the equipment of the Internet of things to be bound completes equipment binding according to the first equipment binding confirmation information; the first device binding confirmation information is obtained by the cloud platform through checking a first device binding confirmation code, and the first device binding confirmation code is obtained by the to-be-bound internet-of-things device through encrypting the first ciphertext again according to the encryption information.
In some of these embodiments, when the public key of the user terminal is included in the device binding request, the method includes,
decrypting the first ciphertext according to a private key of the user terminal to obtain the service identifier set and the password of the bound Internet of things device;
acquiring a random encryption factor from the Internet of things equipment to be bound, and encrypting the service identifier set and the password according to the random encryption factor to obtain a second ciphertext;
sending the first ciphertext and the second ciphertext to the Internet of things equipment to be bound; and the to-be-bound Internet of things equipment decrypts the second ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
In some embodiments, when the device binding request includes the public key of the user terminal, the decryption information is the random encryption factor.
In some embodiments, after accessing a network access point provided by the bound internet of things device according to the service identifier set and the password, the method includes,
receiving second equipment binding confirmation information sent by the cloud platform, and determining that the equipment of the Internet of things to be bound completes equipment binding according to the second equipment binding confirmation information; and the second equipment binding confirmation information is obtained by the cloud platform by checking the first ciphertext received from the to-be-bound internet of things equipment and the first ciphertext received from the bound internet of things equipment.
In a second aspect, in this embodiment, there is provided a method for binding devices in the internet of things, the method including,
the method comprises the steps that a user terminal obtains to-be-bound Internet of things equipment needing to be bound to a user account, generates an equipment binding request and sends the equipment binding request to a cloud platform;
after receiving the equipment binding request, the cloud platform sends encryption information to the bound Internet of things equipment bound under the user account; the encrypted information is generated by the cloud platform according to the equipment binding request;
the bound Internet of things equipment encrypts the service identification set and the password of the bound Internet of things equipment according to the encryption information to obtain a first ciphertext and sends the first ciphertext to the cloud platform;
the cloud platform sends the first ciphertext to the user terminal;
when the device binding request does not include a public key of a user terminal, the user terminal sends the first ciphertext to the to-be-bound Internet of things device; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
In some of these embodiments, when the public key of the user terminal is included in the device binding request, the method includes,
the user terminal decrypts the first ciphertext according to a private key of the user terminal to obtain the service identifier set and the password of the bound internet of things device;
the user terminal obtains a random encryption factor from the Internet of things equipment to be bound, and encrypts the service identifier set and the password according to the random encryption factor to obtain a second ciphertext;
the user terminal sends the first ciphertext and the second ciphertext to the Internet of things equipment to be bound; and the to-be-bound Internet of things equipment decrypts the second ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
In a third aspect, in this embodiment, an internet of things device binding apparatus is provided, which includes,
the system comprises an acquisition module, a binding module and a binding module, wherein the acquisition module is used for acquiring the to-be-bound Internet of things equipment needing to be bound to a user account and generating an equipment binding request;
the sending module is used for sending the equipment binding request to a cloud platform; after receiving the equipment binding request, the cloud platform sends encrypted information to the bound Internet of things equipment bound under the user account, wherein the encrypted information is generated by the cloud platform according to the equipment binding request;
the receiving module is used for receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things equipment by the bound internet of things equipment according to the encryption information and is sent to a cloud platform;
the processing module is used for sending the first ciphertext to the to-be-bound Internet of things device when the device binding request does not include the public key of the user terminal; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
In a fourth aspect, in the present embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the internet of things device binding method according to any one of the first aspect.
Compared with the related art, according to the method, the device and the storage medium for binding the internet of things equipment, the bound internet of things equipment is added to the corresponding user account through the user terminal in advance through the user terminal, the affiliation between the bound internet of things equipment and the user account is established, the equipment information of the internet of things equipment to be bound generates corresponding encryption information and decryption information, the service identifier set and the password of the bound internet of things equipment are encrypted and decrypted according to the encryption information and the decryption information, an agreed encryption and decryption mode is adopted, information insecurity caused by interception and decryption of the information is avoided, and network access and equipment binding of batch internet of things equipment are achieved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a method for binding devices in the internet of things according to the embodiment;
fig. 2 is a schematic flowchart of another method for binding devices in the internet of things according to the embodiment;
fig. 3 is a flowchart of an internet of things device binding method according to the preferred embodiment;
fig. 4 is a flowchart of another method for binding devices in the internet of things according to the preferred embodiment;
fig. 5 is a block diagram of a device binding apparatus of the internet of things according to the embodiment.
Detailed Description
For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.
Unless defined otherwise, technical or scientific terms used herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of this application do not denote a limitation of quantity, either in the singular or the plural. The terms "comprises," "comprising," "has," "having," and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference throughout this application to "connected," "coupled," and the like is not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and not necessarily for describing a particular sequential or chronological order.
In this embodiment, an internet of things device binding system is provided, and the system includes: the user terminal 100, the bound internet of things device 200, the to-be-bound internet of things device 300, and the cloud platform 400.
The user terminal 100 is a terminal installed with an application program, where the application program is used to register a user account in the cloud service and manage the user account, and the user account generally refers to a user registering a corresponding account in the cloud service using an account such as a mobile phone number and a mailbox. The application program can also scan out the bound Internet of things equipment through the near field communication technology, and the user selects the Internet of things equipment needing to be bound.
The bound internet of things device 200 may be a router or an internet of things device that accesses the cloud platform 400 through WIFI. The bound internet of things device 200 is bound to a corresponding user account through an application program of the user terminal 100. After accessing the network access point provided by the bound internet of things device 200, the to-be-bound internet of things device 300 is bound to the user account where the bound internet of things device 200 is located.
The internet of things device is a device with a sensor detection function or an access device with an intelligent function in the internet of things, such as a device supporting a temperature detection sensor or a household intelligent device (which may be an intelligent home system formed by a plurality of devices); the to-be-bound internet-of-things device 300 is an internet-of-things device to be bound to the corresponding user account of the user terminal 100.
The cloud platform 400 provides cloud services for internet of things devices.
In this embodiment, a method for binding internet of things devices is provided, and fig. 1 is a schematic flowchart of the method for binding internet of things devices in this embodiment, and as shown in fig. 1, the process includes the following steps:
step S202, obtaining the to-be-bound Internet of things equipment needing to be bound to the user account, and generating an equipment binding request.
The user terminal 100 acquires the to-be-bound internet of things device 300 which needs to be bound to the user account. Specifically, a user logs in a related user account on the user terminal 100, the user controls the user terminal 100 to scan out the internet of things devices that can be bound through a near field communication technology, the user selects the internet of things devices 300 that need to be bound to the user account from the internet of things devices that can be bound, the user terminal 100 obtains the internet of things devices 300 that need to be bound to the user account through the selection of the user, and generates a corresponding device binding request. The user binds one or more bound internet of things devices 200 to the user account, and selects one or more bound internet of things devices 200 bound to the user account, where the bound internet of things devices 200 have access to the cloud platform 400. The device binding request includes an identifier set of the internet of things device 300 to be bound, and may also include a public key of the user terminal 100.
Step S204, sending the equipment binding request to a cloud platform; after receiving the device binding request, the cloud platform sends the encrypted information to the bound internet of things device bound under the user account, and the encrypted information is generated by the cloud platform according to the device binding request.
The user terminal 100 transmits the device binding request generated in step S202 to the cloud platform 400. Specifically, after the user terminal 100 sends the device binding request to the cloud platform 400, and after the cloud platform 400 receives the device binding request, the cloud platform 400 generates the encryption information according to the identifier of the internet of things device in the device binding request. After generating the encryption information, the cloud platform 400 sends the encryption information to the selected bound internet of things device 200 bound to the user account.
Step S206, receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things device according to the encryption information by the bound internet of things device, and is sent to the cloud platform.
The user terminal 100 receives the first ciphertext transmitted by the cloud platform 400. Specifically, after receiving the encryption information sent by the cloud platform 400, the bound internet of things device 200 encrypts the service identifier set and the password of the bound internet of things device 200 according to the encryption information to obtain a first ciphertext, and sends the first ciphertext to the cloud platform 400. The service identifier set and the password may be the service identifier set and the password of the bound internet of things device 200 itself, or may be the service identifier set and the password of the network to which the bound internet of things device 200 is connected.
Step S208, when the device binding request does not include the public key of the user terminal, sending a first ciphertext to the Internet of things device to be bound; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to the decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
When the device binding request does not include the public key of the user terminal 100, the user terminal 100 sends a first ciphertext to the internet of things device 300 to be bound. Specifically, when the device binding request includes the identification set of the internet-of-things device 300 to be bound, and does not include the public key of the user terminal 100, the cloud platform 400 generates encrypted information according to the identifier of the internet of things device in the identifier set of the internet of things device, the bound internet of things device 200 encrypts the service identifier set and the password of the bound internet of things device 200 according to the encrypted information to obtain a first ciphertext and transmits the first ciphertext to the cloud platform 400, the cloud platform 400 transmits the first ciphertext to the terminal device, the terminal device transmits the received first ciphertext to the internet of things device 300 to be bound, the internet of things device 300 to be bound decrypts the first ciphertext according to the decryption information to obtain the service identifier set and the password of the bound internet of things device 200, and accesses the bound internet of things device 200 according to the service identifier set and the password, so that the internet of things device 300 to be bound is bound to the user account. Since the bound internet of things device 200 is bound to the user account, the to-be-bound internet of things device 300 is bound to the relevant user account after accessing the network access point provided by the bound internet of things device 200.
In the method for binding internet of things equipment provided in this embodiment, a user adds the bound internet of things equipment 200 to a corresponding user account through the user terminal 100 in advance, establishes an affiliation between the bound internet of things equipment 200 and the user account, generates corresponding encryption information and decryption information from equipment information of the internet of things equipment 300 to be bound, encrypts and decrypts a service identifier set and a password of the bound internet of things equipment 200 according to the encryption information and the decryption information, and realizes network access and equipment binding of batch internet of things equipment.
In some of these embodiments, when the public key of the user terminal 100 is not included in the device binding request, both the encryption information and the decryption information are device salt values. Specifically, when the device binding request includes the identifier set of the internet of things device 300 to be bound and does not include the public key of the user terminal 100, after receiving the device identifier of the internet of things device 300 to be bound, the cloud platform 400 queries a corresponding device salt value according to the device identifier, and sends the device salt value to the bound internet of things device 200. The device salt value is obtained by encrypting the device identifier and the device security code of the internet of things device, and the cloud platform 400 generates the device salt value in advance and stores the device salt value in the memory.
According to the method for binding the internet of things equipment, the encrypted information and the decrypted information are obtained according to the equipment identification and the equipment security code of the internet of things equipment, and for different internet of things equipment, the encrypted information and the decrypted information are different, so that the information security is further improved.
In some embodiments, after the to-be-bound internet-of-things device 300 accesses the network access point provided by the bound internet-of-things device according to the service identifier set and the password, the user terminal 100 receives first device binding confirmation information sent by the cloud platform 400, and determines that the to-be-bound internet-of-things device 300 completes device binding according to the first device binding confirmation information. The first device binding confirmation information is obtained by the cloud platform 400 by verifying the first device binding confirmation code, and the first device binding confirmation code is obtained by the to-be-bound internet-of-things device 300 by encrypting the first ciphertext again according to the encryption information, that is, the service identifier and the password of the bound internet-of-things device 200 are encrypted twice by using the encryption information to obtain the first device binding confirmation code. Specifically, after the to-be-bound internet-of-things device 300 is connected to the cloud platform 400, the device salt value is used to encrypt the first ciphertext again to obtain a first device binding confirmation code, and the to-be-bound internet-of-things device 300 sends the device binding confirmation code to the cloud platform 400. The cloud platform 400 encrypts a first ciphertext sent by the bound internet of things device 200 by using a device salt value to obtain a cloud platform binding confirmation code, after receiving the first device binding confirmation code, the cloud platform 400 compares the cloud platform binding confirmation code with the first device binding confirmation code for verification, and after the verification is passed, the internet of things device completes network access and device binding, and the cloud platform 400 generates corresponding first device binding confirmation information and sends the first device binding confirmation information to the user terminal 100. The user terminal 100 receives the first device binding confirmation information sent by the cloud platform 400, and determines that the internet of things device 300 to be bound completes device binding according to the first device binding confirmation information.
According to the method for binding the internet of things equipment, binding verification is added when the internet of things equipment is bound, the internet of things equipment is ensured to be accessed to the agreed bound internet of things equipment 200, and counterfeiting attacks are avoided.
Fig. 2 is a schematic flow diagram of another method for binding devices of the internet of things according to this embodiment, and as shown in fig. 2, the flow includes the following steps:
step S302, obtaining the to-be-bound Internet of things equipment needing to be bound to the user account, and generating an equipment binding request; the device binding request includes a public key of the user terminal.
Step S304, sending the equipment binding request to a cloud platform; after receiving the device binding request, the cloud platform sends the encrypted information to the bound internet of things device bound under the user account, and the encrypted information is generated by the cloud platform according to the device binding request.
The user terminal 100 transmits the device binding request generated in step S302 to the cloud platform 400. Specifically, after the user terminal 100 sends the device binding request to the cloud platform 400, and after the cloud platform 400 receives the device binding request, the cloud platform 400 obtains the public key of the user terminal 100 in the device binding request as the encryption information. After generating the encryption information, the cloud platform 400 sends the encryption information to the selected bound internet of things device 200 bound to the user account.
Step S306, receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things device according to the encryption information by the bound internet of things device, and is sent to the cloud platform.
The user terminal 100 receives the first ciphertext transmitted by the cloud platform 400. Specifically, after receiving the encryption information sent by the cloud platform 400, the bound internet of things device 200 encrypts the service identifier set and the password of the bound internet of things device 200 according to the public key to obtain a first ciphertext, and sends the first ciphertext to the cloud platform 400. The service identifier set and the password may be the service identifier set and the password of the bound internet of things device 200 itself, or may be the service identifier set and the password of the network to which the bound internet of things device 200 is connected.
And S308, decrypting the first ciphertext according to the private key of the user terminal to obtain the service identifier set and the password of the bound Internet of things equipment.
The user terminal 100 decrypts the first ciphertext according to the private key of the user terminal 100, so as to obtain the service identifier set and the password of the bound internet of things device 200.
Step S310, a random encryption factor is obtained from the Internet of things equipment to be bound, and the service identifier set and the password are encrypted according to the random encryption factor to obtain a second ciphertext.
The user terminal 100 connects the internet of things devices 300 to be bound one by one, obtains a random encryption factor from the internet of things devices, and encrypts the service identifier set and the password according to the random encryption factor to obtain a second ciphertext.
Step S312, sending the first ciphertext and the second ciphertext to the Internet of things equipment to be bound; and the to-be-bound Internet of things equipment decrypts the second ciphertext according to the decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
Specifically, the user terminal 100 sends the first ciphertext and the second ciphertext to the to-be-bound internet-of-things device 300, and after the to-be-bound internet-of-things device 300 decrypts the second ciphertext according to the random encryption factor, the service identifier set and the password of the bound internet-of-things device 200 are obtained, and the service identifier set and the password are accessed to a network access point provided by the bound internet-of-things device 200, so that the to-be-bound internet-of-things device 300 is bound to the user account.
In the method for binding internet of things devices provided in this embodiment, the service identifier set and the password of the bound internet of things device 200 are encrypted and decrypted by the public key and the private key generated by the user terminal 100 and the random encryption factor generated by the internet of things devices, so that insecurity of information caused by interception and decryption of the information is avoided. For different internet of things devices, the generated random encryption factors are different, and the information security is further improved.
In some embodiments, after the to-be-bound internet-of-things device 300 accesses the bound internet-of-things device 200 according to the service identifier set and the password, the user terminal 100 receives second device binding confirmation information sent by the cloud platform 400, and determines that the to-be-bound internet-of-things device 300 completes device binding according to the second device binding confirmation information, and the second device binding confirmation information is obtained by verifying a first ciphertext received from the to-be-bound internet-of-things device 300 and a first ciphertext received from the bound internet-of-things device 200 by the cloud platform 400. Specifically, after the to-be-bound internet-of-things device 300 accesses a network access point provided by the bound internet-of-things device 200, a first ciphertext is sent to the cloud platform 400, the cloud platform 400 compares the first ciphertext received from the to-be-bound internet-of-things device 300 with the first ciphertext received from the bound internet-of-things device 200 for verification, if the ciphertexts received from the two places are the same, the verification is passed, that the internet-of-things device completes network access and device binding is indicated, the cloud platform 400 generates corresponding second device binding confirmation information, and sends the second device binding confirmation information to the user terminal 100. The user terminal 100 receives the second device binding confirmation information sent by the cloud platform 400, and determines that the internet of things device 300 to be bound completes device binding according to the second device binding confirmation information.
According to the method for binding the internet of things equipment, binding verification is added when the internet of things equipment is bound, the internet of things equipment is ensured to be accessed to the agreed bound internet of things equipment 200, and counterfeiting attacks are avoided.
The present embodiment is described and illustrated below by means of preferred embodiments.
Fig. 3 is a flowchart of an internet of things device binding method in the preferred embodiment, and as shown in fig. 3, the method includes the following steps:
a1, the user terminal 100 scans out the internet of things devices that can be bound through the near field communication technology, and the user selects the internet of things devices that need to be bound;
step a2, the user terminal 100 sends the internet of things device identifier set to be bound to the cloud platform 400;
step a3, after receiving an identifier of the internet of things device 300 to be bound, the cloud platform 400 acquires a pre-stored device salt value according to the identifier of the internet of things device, where the device salt value is obtained by encrypting the device identifier of the internet of things device and the device security code, and sends the device salt value to the bound internet of things device 200 under the user account;
the bound internet of things device 200 may be a gateway device, a router, or an internet of things device that accesses the cloud platform 400 through WIFI; the method comprises the steps that a user logs in a user account on a user terminal, one or more pieces of Internet of things equipment are bound under the user account, and one bound piece of Internet of things equipment under the user account is selected.
Step a4, the bound internet of things device 200 returns a cipher text obtained by encrypting the service identifier set and the password by the device salt value to the cloud platform 400;
the service identifier set and the password may be the service identifier set and the password of the bound internet of things device 200 itself, or may be the service identifier set and the password of the network to which the bound internet of things device 200 is connected.
Step a5, the cloud platform 400 returns the identifier and the ciphertext of the internet of things device 300 to be bound to the user terminal 100;
step a6, the user terminal 100 sends the ciphertexts to the corresponding internet of things devices 300 to be bound one by one;
step a7, after receiving the ciphertext, the internet of things device 300 to be bound performs validity period check; if the verification is passed, step a8 is executed; if the verification fails, ending the equipment binding process;
after receiving the ciphertext, the internet of things device 300 to be bound needs to verify whether the network access is valid. If the check fails, the ciphertext is not decrypted. If the check is passed, the to-be-bound internet-of-things device 300 obtains a device salt value through calculation, decrypts the ciphertext through the device salt value, obtains the service identifier set and the password of the bound internet-of-things device 200, connects to the network access point provided by the bound internet-of-things device 200, and accesses the cloud service.
Step a8, after the verification is passed, the device to be bound calculates a device salt value to decrypt the ciphertext to obtain a service identifier set and a password, and connects the service identifier set with the network access point provided by the bound internet-of-things device 200;
step a9, connecting the internet of things device 300 to be bound to the cloud platform 400, encrypting the ciphertext again by using the device salt value to obtain a device binding confirmation code, and sending the device binding confirmation code to the cloud platform 400;
step a10, the cloud platform 400 verifies the device binding confirmation code; if the verification is passed, step a11 is executed; if the verification fails, ending the equipment binding process;
the cloud platform 400 verifies the device binding confirmation code to ensure that the internet of things device is connected to the network access point provided by the bound internet of things device 200. And a11, completing network access and binding of the Internet of things equipment.
The method for binding the internet of things equipment provided by the embodiment has the following advantages:
1) the Internet of things equipment does not need to complete network access in advance;
2) the user terminal does not need to acquire the information of the Internet of things equipment in advance;
3) the Internet of things equipment does not need to open an interface for providing equipment information to the outside;
4) the Internet of things equipment without equipment passwords can be supported;
5) sensitive information is encrypted in the whole process of network access and equipment binding, so that the safety of user data is ensured;
6) the effectiveness verification is added when the Internet of things equipment is accessed to the network, the addition of malicious equipment is reduced, and the safety is improved;
7) binding verification is added when the Internet of things equipment is bound, the equipment is ensured to be accessed to an appointed network access point, and imitation attack is avoided.
Fig. 4 is a flowchart of another method for binding devices in the internet of things according to the preferred embodiment, and as shown in fig. 4, the method includes the following steps:
b1, the user terminal 100 scans out the internet of things devices that can be bound through the near field communication technology, and the user selects the internet of things devices that need to be bound;
step b2, the user terminal 100 sends the device identifier set of the internet of things to be bound and the public key of the user terminal 100 to the cloud platform 400;
step b3, the cloud platform 400 sends the public key to the bound internet of things device 200; the bound internet of things device 200 may be a gateway device, a router, or an internet of things device that accesses the cloud platform 400 through WIFI;
the method comprises the steps that a user logs in a user account on a user terminal, one or more pieces of Internet of things equipment are bound under the user account, and one bound piece of Internet of things equipment under the user account is selected.
Step b4, the bound internet of things device 200 encrypts the service identifier set and the password by a public key to obtain a ciphertext, and returns the ciphertext to the cloud platform 400;
the service identifier set and the password may be the service identifier set and the password of the bound internet of things device 200 itself, or may be the service identifier set and the password of the network to which the bound internet of things device 200 is connected.
Step b5, the cloud platform 400 returns the ciphertext to the user terminal 100;
step b6, the user terminal 100 decrypts by private key to obtain service identification set and password;
b7, the user terminal 100 connects the to-be-bound internet of things devices 300 one by one, obtains the random encryption factor from the to-be-bound internet of things devices 300, encrypts the service identifier set and the password by the random encryption factor to obtain a networking ciphertext, and transmits the networking ciphertext and the ciphertext to the to-be-bound internet of things devices 300;
step b8, after receiving the networking ciphertext and the ciphertext, the internet of things device 300 to be bound performs validity period check; if the verification is passed, executing step b 9; if the verification fails, ending the equipment binding process;
after receiving the networking ciphertext and the ciphertext, the to-be-bound internet-of-things device 300 needs to verify whether the network access is valid. And if the verification fails, the networking ciphertext is not decrypted. If the check is passed, the device decrypts the service identifier set and the password through the random encryption factor to obtain the bound internet of things device 200 itself or the connected service identifier set and the password, so as to connect to the network access point provided by the bound internet of things device 200 and access the cloud platform 400.
B9, after the verification is passed, the internet of things equipment decrypts the ciphertext by using the random encryption factor to obtain a service identifier set and a password, and connects the service identifier set and the password with the network access point provided by the bound internet of things equipment 200;
step b10, connecting the internet of things device 300 to be bound to the cloud platform 400, and sending the ciphertext to the cloud platform 400;
step b11, the cloud platform 400 checks whether the device identifier and the ciphertext are matched; if the verification is passed, executing step b 11; if the verification fails, ending the equipment binding process;
and step b12, completing network access and binding.
The method for binding the internet of things equipment provided by the embodiment has the following advantages:
1) the Internet of things equipment does not need to complete network access in advance;
2) the user terminal does not need to acquire the information of the Internet of things equipment in advance;
3) the Internet of things equipment does not need to open an interface for providing equipment information to the outside;
4) the Internet of things equipment without equipment passwords can be supported;
5) sensitive information is encrypted in the whole process of network access and equipment binding, so that the safety of user data is ensured;
6) the effectiveness verification is added when the Internet of things equipment is accessed to the network, the addition of malicious equipment is reduced, and the safety is improved;
7) binding verification is added when the Internet of things equipment is bound, the equipment is ensured to be accessed to an appointed network access point, and imitation attack is avoided.
The embodiment also provides an internet of things device binding apparatus, which is used for implementing the foregoing embodiments and preferred embodiments, and the description of the apparatus is omitted. The terms "module," "unit," "subunit," and the like as used below may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 5 is a block diagram of a structure of an internet of things device binding apparatus in this embodiment, and as shown in fig. 5, the apparatus includes:
the obtaining module 10 is configured to obtain an internet of things device 300 to be bound under a user account, and generate a device binding request;
a sending module 20, configured to send the device binding request to the cloud platform 400; after receiving the device binding request, the cloud platform 400 sends encryption information to the bound internet of things device 200 bound under the user account, wherein the encryption information is generated by the cloud platform 400 according to the device binding request;
the receiving module 30 is configured to receive a first ciphertext sent by the cloud platform 400; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things device 200 according to the encryption information by the bound internet of things device 200, and is sent to the cloud platform 400;
the processing module 40 is configured to send a first ciphertext to the to-be-bound internet-of-things device 300 when the device binding request does not include the public key of the user terminal 100; the to-be-bound internet-of-things device 300 decrypts the first ciphertext according to the decryption information, obtains the service identifier set and the password of the bound internet-of-things device 200, and accesses the bound internet-of-things device 200 according to the service identifier set and the password, so that the to-be-bound internet-of-things device 300 is bound to the user account.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
There is also provided in this embodiment an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, acquiring the to-be-bound Internet of things equipment 300 needing to be bound to the user account, and generating an equipment binding request;
s2, sending the device binding request to the cloud platform 400; after receiving the device binding request, the cloud platform 400 sends encryption information to the bound internet of things device 200 bound under the user account, wherein the encryption information is generated by the cloud platform 400 according to the device binding request;
s3, receiving the first ciphertext sent by the cloud platform 400; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things device 200 according to the encryption information by the bound internet of things device 200, and is sent to the cloud platform 400;
s4, when the device binding request does not include the public key of the user terminal 100, sending a first ciphertext to the to-be-bound internet-of-things device 300; after decrypting the first ciphertext according to the decryption information, the to-be-bound internet-of-things device 300 obtains the service identifier set and the password of the bound internet-of-things device 200, and accesses the network access point provided by the bound internet-of-things device 200 according to the service identifier set and the password, so that the to-be-bound internet-of-things device 300 is bound to the user account.
It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementations, and details are not described again in this embodiment.
In addition, in combination with the internet of things device binding method provided in the foregoing embodiment, a storage medium may also be provided in this embodiment. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements the steps of any of the internet of things device binding methods in the embodiments described above.
It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.
It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
The term "embodiment" is used herein to mean that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly or implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A method for binding equipment of the Internet of things is characterized by comprising the following steps,
acquiring the to-be-bound Internet of things equipment needing to be bound to a user account, and generating an equipment binding request;
sending the device binding request to a cloud platform; after receiving the equipment binding request, the cloud platform sends encrypted information to the bound Internet of things equipment bound under the user account, wherein the encrypted information is generated by the cloud platform according to the equipment binding request;
receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things equipment by the bound internet of things equipment according to the encryption information and is sent to a cloud platform;
when the equipment binding request does not include a public key of a user terminal, sending the first ciphertext to the to-be-bound Internet of things equipment; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
2. According to claimTo be administeredSolving 1 the internet of things equipment binding method, wherein when the equipment binding request does not include the public key of the user terminal, the encrypted information and the decrypted information are both equipment salt values; and the equipment salt value is generated according to the equipment identifier and the equipment security code of the equipment of the Internet of things to be bound.
3. The method for binding the device of the internet of things according to claim 1 or 2, wherein after accessing the network access point provided by the bound device of the internet of things according to the service identifier set and the password, the method comprises,
receiving first equipment binding confirmation information sent by the cloud platform, and determining that the equipment of the Internet of things to be bound completes equipment binding according to the first equipment binding confirmation information; the first device binding confirmation information is obtained by the cloud platform through checking a first device binding confirmation code, and the first device binding confirmation code is obtained by the to-be-bound internet-of-things device through encrypting the first ciphertext again according to the encryption information.
4. The Internet of things device binding method of claim 1, wherein when the device binding request includes a public key of the user terminal, the method includes,
decrypting the first ciphertext according to a private key of the user terminal to obtain the service identifier set and the password of the bound Internet of things device;
acquiring a random encryption factor from the Internet of things equipment to be bound, and encrypting the service identifier set and the password according to the random encryption factor to obtain a second ciphertext;
sending the first ciphertext and the second ciphertext to the Internet of things equipment to be bound; and the to-be-bound Internet of things equipment decrypts the second ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
5. The internet of things device binding method according to claim 4, wherein when the device binding request includes a public key of the user terminal, the decryption information is the random encryption factor.
6. The method for binding the IOT devices according to any one of claims 1, 2, 4 or 5, wherein after accessing the network access points provided by the bound IOT devices according to the service identifier set and the password, the method comprises,
receiving second equipment binding confirmation information sent by the cloud platform, and determining that the equipment of the Internet of things to be bound completes equipment binding according to the second equipment binding confirmation information; and the second equipment binding confirmation information is obtained by the cloud platform by checking the first ciphertext received from the to-be-bound internet of things equipment and the first ciphertext received from the bound internet of things equipment.
7. A method for binding equipment of the Internet of things is characterized by comprising the following steps,
the method comprises the steps that a user terminal obtains to-be-bound Internet of things equipment needing to be bound to a user account, generates an equipment binding request and sends the equipment binding request to a cloud platform;
after receiving the equipment binding request, the cloud platform sends encryption information to the bound Internet of things equipment bound under the user account; the encrypted information is generated by the cloud platform according to the equipment binding request;
the bound Internet of things equipment encrypts the service identification set and the password of the bound Internet of things equipment according to the encryption information to obtain a first ciphertext and sends the first ciphertext to the cloud platform;
the cloud platform sends the first ciphertext to the user terminal;
when the device binding request does not include the public key of the user terminal, the user terminal sends the first ciphertext to the to-be-bound internet-of-things device; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
8. The Internet of things device binding method of claim 7, wherein when the device binding request includes a public key of the user terminal, the method includes,
the user terminal decrypts the first ciphertext according to a private key of the user terminal to obtain the service identifier set and the password of the bound internet of things device;
the user terminal obtains a random encryption factor from the Internet of things equipment to be bound, and encrypts the service identifier set and the password according to the random encryption factor to obtain a second ciphertext;
the user terminal sends the first ciphertext and the second ciphertext to the Internet of things equipment to be bound; and the to-be-bound Internet of things equipment decrypts the second ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
9. An Internet of things equipment binding device is characterized by comprising,
the system comprises an acquisition module, a binding module and a binding module, wherein the acquisition module is used for acquiring the to-be-bound Internet of things equipment needing to be bound to a user account and generating an equipment binding request;
the sending module is used for sending the equipment binding request to a cloud platform; after receiving the equipment binding request, the cloud platform sends encrypted information to the bound Internet of things equipment bound under the user account, wherein the encrypted information is generated by the cloud platform according to the equipment binding request;
the receiving module is used for receiving a first ciphertext sent by the cloud platform; the first ciphertext is obtained by encrypting the service identifier set and the password of the bound internet of things equipment by the bound internet of things equipment according to the encryption information and is sent to a cloud platform;
the processing module is used for sending the first ciphertext to the to-be-bound Internet of things device when the device binding request does not include the public key of the user terminal; and the to-be-bound Internet of things equipment decrypts the first ciphertext according to decryption information, acquires the service identifier set and the password of the bound Internet of things equipment, and accesses a network access point provided by the bound Internet of things equipment according to the service identifier set and the password so as to bind the to-be-bound Internet of things equipment to the user account.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the internet of things device binding method of any one of claims 1 to 6.
CN202111675334.5A 2021-12-31 2021-12-31 Internet of things equipment binding method, device and storage medium Active CN114422216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111675334.5A CN114422216B (en) 2021-12-31 2021-12-31 Internet of things equipment binding method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111675334.5A CN114422216B (en) 2021-12-31 2021-12-31 Internet of things equipment binding method, device and storage medium

Publications (2)

Publication Number Publication Date
CN114422216A true CN114422216A (en) 2022-04-29
CN114422216B CN114422216B (en) 2024-01-09

Family

ID=81271848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111675334.5A Active CN114422216B (en) 2021-12-31 2021-12-31 Internet of things equipment binding method, device and storage medium

Country Status (1)

Country Link
CN (1) CN114422216B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065712A (en) * 2022-08-16 2022-09-16 飞天诚信科技股份有限公司 Method and system for sensing and controlling shared equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160050566A1 (en) * 2013-04-28 2016-02-18 Huawei Device Co., Ltd. Wireless Terminal Configuration Method, Device, and System
US20160269527A1 (en) * 2015-03-13 2016-09-15 Xiaomi Inc. Methods and apparatuses for binding with device
CN108616882A (en) * 2018-04-10 2018-10-02 青岛海尔科技有限公司 Household appliance matches network method, method of network entry, device, storage medium and equipment
US10129499B1 (en) * 2015-12-07 2018-11-13 Gopro, Inc. Securing wireless network credentials without a user login
CN111726886A (en) * 2019-03-20 2020-09-29 阿里巴巴集团控股有限公司 Network configuration method and device and electronic equipment
CN112187831A (en) * 2020-10-30 2021-01-05 腾讯科技(深圳)有限公司 Equipment network access method and device, storage medium and electronic equipment
WO2021077930A1 (en) * 2019-10-22 2021-04-29 珠海格力电器股份有限公司 Automatic networking method, apparatus, device, and readable medium
CN113259918A (en) * 2021-05-11 2021-08-13 杭州华橙软件技术有限公司 Equipment binding method and system
CN113423105A (en) * 2021-06-10 2021-09-21 杭州华橙软件技术有限公司 Network connection method and device
CN113538739A (en) * 2021-06-09 2021-10-22 杭州华橙软件技术有限公司 Pairing method of intelligent lock, electronic device and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160050566A1 (en) * 2013-04-28 2016-02-18 Huawei Device Co., Ltd. Wireless Terminal Configuration Method, Device, and System
US20160269527A1 (en) * 2015-03-13 2016-09-15 Xiaomi Inc. Methods and apparatuses for binding with device
US10129499B1 (en) * 2015-12-07 2018-11-13 Gopro, Inc. Securing wireless network credentials without a user login
CN108616882A (en) * 2018-04-10 2018-10-02 青岛海尔科技有限公司 Household appliance matches network method, method of network entry, device, storage medium and equipment
CN111726886A (en) * 2019-03-20 2020-09-29 阿里巴巴集团控股有限公司 Network configuration method and device and electronic equipment
WO2021077930A1 (en) * 2019-10-22 2021-04-29 珠海格力电器股份有限公司 Automatic networking method, apparatus, device, and readable medium
CN112187831A (en) * 2020-10-30 2021-01-05 腾讯科技(深圳)有限公司 Equipment network access method and device, storage medium and electronic equipment
CN113259918A (en) * 2021-05-11 2021-08-13 杭州华橙软件技术有限公司 Equipment binding method and system
CN113538739A (en) * 2021-06-09 2021-10-22 杭州华橙软件技术有限公司 Pairing method of intelligent lock, electronic device and storage medium
CN113423105A (en) * 2021-06-10 2021-09-21 杭州华橙软件技术有限公司 Network connection method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065712A (en) * 2022-08-16 2022-09-16 飞天诚信科技股份有限公司 Method and system for sensing and controlling shared equipment
CN115065712B (en) * 2022-08-16 2022-11-04 飞天诚信科技股份有限公司 Method and system for sensing and controlling shared equipment

Also Published As

Publication number Publication date
CN114422216B (en) 2024-01-09

Similar Documents

Publication Publication Date Title
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
US8763097B2 (en) System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN103763631B (en) Authentication method, server and television set
EP2696557B1 (en) System and method for accessing third-party applications based on cloud platform
JP4617763B2 (en) Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program
CN105207774B (en) The cryptographic key negotiation method and device of verification information
CN101005361B (en) Server and software protection method and system
US8868909B2 (en) Method for authenticating a communication channel between a client and a server
US8800013B2 (en) Devolved authentication
CN107040513B (en) Trusted access authentication processing method, user terminal and server
CN108243176B (en) Data transmission method and device
CN101577917A (en) Safe dynamic password authentication method based on mobile phone
WO2016115807A1 (en) Wireless router access processing method and device, and wireless router access method and device
CN106027251B (en) A kind of identity card card-reading terminal and cloud authentication platform data transmission method and system
CN107483415B (en) Bidirectional authentication method for shared electricity utilization interactive system
WO2012067847A1 (en) System and method for end to end encryption
CN106027473B (en) Identity card card-reading terminal and cloud authentication platform data transmission method and system
CN102333085B (en) Security network authentication system and method
CN111901346A (en) Identity authentication system
CA2879910A1 (en) Terminal identity verification and service authentication method, system and terminal
CN113411187B (en) Identity authentication method and system, storage medium and processor
WO2005088892A1 (en) A method of virtual challenge response authentication
CN104243452B (en) A kind of cloud computing access control method and system
CN109451504B (en) Internet of things module authentication method and system
CN114422216B (en) Internet of things equipment binding method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant